7.1
Demands .................................................................................................................................................................. 39
7.2
Objectives ................................................................................................................................................................ 39
7.3
Methods.................................................................................................................................................................... 39
7.4
Steps......................................................................................................................................................................... 40
7.4.1
7.4.2
Setup Alert detected attack ............................................................................................................................. 41
Virtual Private Network ......................................................................................................................44
8.1
Terminology Explanation......................................................................................................................................... 45
8.1.1
VPN ................................................................................................................................................................ 45
8.1.2
IPSec............................................................................................................................................................... 45
8.1.3
Security Association ....................................................................................................................................... 45
8.1.4
IPSec Algorithms............................................................................................................................................ 45
8.1.5
Key Management............................................................................................................................................ 45
8.1.6
Encapsulation ................................................................................................................................................. 46
8.1.7
IPSec Protocols............................................................................................................................................... 47
8.2
9.1
Demands .................................................................................................................................................................. 49
9.2
Objectives ................................................................................................................................................................ 49
9.3
Methods.................................................................................................................................................................... 49
9.4
Steps......................................................................................................................................................................... 50
9.4.1
9.4.2
10.1
Demands .................................................................................................................................................................. 61
10.2
Objectives ................................................................................................................................................................ 61
10.3
Methods.................................................................................................................................................................... 61
10.4
Steps......................................................................................................................................................................... 62
11.1
Demands .................................................................................................................................................................. 65
11.2
Objectives ................................................................................................................................................................ 65
11.3
Methods.................................................................................................................................................................... 65
11.4
Steps......................................................................................................................................................................... 66
11.4.1
Setup L2TP Network Server........................................................................................................................... 66
11.4.2
Setup L2TP Network Client ........................................................................................................................... 68
Content Filters .....................................................................................................................................70
12.1
Demands .................................................................................................................................................................. 71
12.2
Objectives ................................................................................................................................................................ 71
12.3
Methods.................................................................................................................................................................... 71
12.4
Steps......................................................................................................................................................................... 72
13.1
Demands .................................................................................................................................................................. 77
13.2
Objectives ................................................................................................................................................................ 77
WAN) .................................................................................................... 40
II